Get a Pentest and security assessment of your IT network.

News

New collision attacks against triple-DES, Blowfish break HTTPS sessions

French researchers develop ‘Sweet32’ attack on 64-bit block ciphers. Attackers can take authentication cookies from HTTPS-protected traffic using triple-DES (3DES) and Blowfish. Attack highlights why it is necessary for sites to stop using legacy cipher and upgrade to modern, more secure ciphes. Attacker can target a victim’s authentication cookie by luring them to a malicious site and injecting JavaScript into the victim’s browser and injecting the cookie. The majority of OpenVPN connections and between 1 percent and 2 percent of the Internet’s traffic may be susceptible to Sweet32.”]

Source: https://www.csoonline.com/article/3112624/new-collision-attacks-against-triple-des-blowfish-break-https-sessions.html

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

BlackEnergy exploits recently fixed flaws in Siemens WinCC

News

Google Chrome will block code injection from third-party software within 14 months